The European Court of Justice has recently ruled that TV boxes can infringe copyright if they are shipped loaded with pirating software. The Dutch anti-piracy group BREIN was quick to use this decision and pressure pirate media player vendors to cease their sales or risk tens of thousands of euros in fines.

4 people, one of which is a board member of the Pirate Party, received prison sentence for running a pirate websites: all of them are in their 20s and were accused of running streaming portal Dreamfilm and other sites like Piratehub and Tankefetast. The men received between 6 and 10 months of jail time – approximately the same time as the operators of The Pirate Bay received in their landmark case a few years ago.

Trump has recently signed an executive order to improve the US computer networks in order to protect critical infrastructure from online attacks. There is a plan to enhance the network security of the government agencies that suffered high-profile data breaches in the past. According to the plan, the agency heads will be responsible for introducing risk management measures and keeping their systems up-to-date. Critical infrastructure operators, including those providing utilities, financial and health networks, will be required to find ways to better defend their networks.

During his show, John Oliver encouraged viewers to flood Federal Communications Commission site with comments, and it seems that the result was overwhelming. However, the agency itself claims that it suffered DDoS attacks.

The world still remembers the high-profile dating website data breach at Ashley Madison: at the time, the hackers released the personal data of 37m users in order to reveal the dishonesty of the service which encouraged married men to “get an affair” and did not wipe information about their accounts even after being paid for doing so. That breach was the largest but not the last – Guardian Soulmates became the latest dating website whose user details have been exposed.

The US Appeals Court has denied a request from a MegaUpload user to intervene on his behalf and help him get his files back. Kyle Goodwin, a sports videographer, has spent years in attempts to get his non-infringing files back, which remain under lock and key.

Your Internet Service Provider knows your IP address and can send Copyright Infringement Notice to you soon. So, what should you do if you have just received a copyright infringement letter from your Internet Provider or government agency like RIAA, MPAA and other?

Here you can find the best tips:

Copyright Infringement letters should generally be ignored. If they can't confirm that you ever received the notice, they're even less likely to go after you.

If you have received a copyright infringement letter, don't respond to it, don't visit the website provided, ignore threats of lawsuits and settlement offers, and if you are actually distributing the material in question, stop immediately.

The best way to avoid such a notice is prevention and education. If you have a wireless router and it is not secured or password-protected, you need to lock it down immediately. If you run BitTorrent client or other sharing software, it is a great idea to check for material being offered for upload by the software and remove it.

RIAA, MPAA and other Government Agencies don’t have your email unless you give it to them by replying. They send a complaint to your ISP with ONLY your IP address and your ISP figures out who that IP belongs to, at what time and your ISP sends out an email accordingly (read more here - You Could Be Liable for $150k in Penalties Per Downloaded Song)

A Netherlands-based anti-piracy group BREIN announced that it had reached a 10,000 euro settlement with a supplier of illegal IPTV services. The agency obtained an ex-parte court order against a person selling cheap subscriptions to otherwise premium channels, which could be accessed with help of a set-top box or regular PC.

A sophisticated phishing or malware attack at Google Docs users is now widespread: users receive emails inviting them to edit a Google Doc, with a subject line stating a contact “has shared a document on Google Docs with you”. If you click the “Open in Docs” button, you will be taken to a legitimate Google sign-in screen inviting to “continue in Google Docs”. But if you click it, you grant permission to a bogus third-party app with a deceptive name to access contacts and email. As a result, you can find spam spreading to additional contacts.

British MPs who are heading out on the campaign trail will become much more vulnerable to hacking. As is known, hackers are most likely to intervene in democracies just before the election, because they lose protection of the parliament’s information security services.